/graphics/k3d/

> cgit logo index : freebsd-ports-graphics
FreeBSD graphics obsolete development ports (https://github.com/freebsd/freebsd-ports-graphics)
aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update to 0.1.1.13mnag2006-02-1811-180/+163
* - Update to 0.4.8ehaupt2006-02-184-16/+18
* Update 0.6.4 --> 0.6.9cy2006-02-182-4/+4
* - Update to 1.1.1garga2006-02-183-6/+6
* Document gnupg -- false positive signature verification.simon2006-02-171-0/+39
* - bump PORTREVISION for plist change.clsung2006-02-174-18/+44
* Update to DAT 4699jeh2006-02-172-4/+4
* Upgrade to 1.2.4 and fix a security issue.thierry2006-02-172-7/+4
* Add missing patch files.cy2006-02-166-0/+169
* Ugrade 2.3.1-2 --> 2.4.0.1cy2006-02-1614-976/+42
* Document rssh -- privilege escalation vulnerability.remko2006-02-161-0/+33
* Document tor -- malicious tor server can locate a hidden service.remko2006-02-161-0/+29
* Document sudo -- arbitrary command execution.remko2006-02-161-0/+36
* Document libtomcrypt -- weak signature scheme with ECC keys.remko2006-02-161-0/+25
* Document mantis -- "view_filters_page.php" cross site scripting vulnerability.remko2006-02-161-0/+33
* Document phpbb -- multiple vulnerabilities.remko2006-02-161-0/+43
* Document postgresql -- character conversion and tsearch2 vulnerabilities.remko2006-02-161-0/+46
* Document heartbeat -- insecure temporary file creation vulnerability.remko2006-02-161-0/+28
* Update to DAT 4697jeh2006-02-162-4/+4
* - Transfer maintainership of the Prelude ports to the submitter,sergei2006-02-154-4/+4
* Document kpdf -- heap based buffer overflowremko2006-02-151-0/+29
* Document perl, webmin, usermin -- perl format string integer wrap vulnerabilityremko2006-02-151-0/+46
* Document phpicalendar -- cross site scripting vulnerability andremko2006-02-151-0/+54
* Upgrade to 1.4.2.1.kuriyama2006-02-154-16/+14
* Update to 1.10.lawrance2006-02-152-4/+4
* Update to 0.4.7.marcus2006-02-156-8/+14
* Update to DAT 4696jeh2006-02-152-4/+4
* - Update to 0.9.3sergei2006-02-143-13/+14
* - Update to 0.9.2sergei2006-02-143-19/+19
* - Update to 0.9.4 (unbreaks fetching)sergei2006-02-144-21/+23
* - Update to 0.9.5sergei2006-02-143-12/+11
* Document FreeBSD -- Infinite loop in SACK handling (FreeBSD SA 06.08)remko2006-02-141-0/+36
* Document pf -- IP fragment handling panic, FreeBSD SA 06.07remko2006-02-141-0/+41
* Document FreeBSD -- Local kernel memory disclosureremko2006-02-141-0/+38
* Document IEEE 802.11 -- buffer overflow (FreeBSD SA 06.05).remko2006-02-141-0/+35
* Add FreeBSD SA 06.04.ipfw to the vuln.xml list.remko2006-02-141-0/+36
* Update to DAT 4695jeh2006-02-142-4/+4
* - Make an option for kinkd support. This should work on 4-STABLEsumikawa2006-02-134-18/+71
* Update to 0.34.lawrance2006-02-132-9/+8
* No need to conditionalise USE_GETOPT_LONG.lawrance2006-02-133-12/+3
* Update to 0.4.7.lawrance2006-02-122-5/+4
* Forget to add HPN patches.mnag2006-02-122-2/+8